Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP. Zhenhua Li Chunjing Han Gaogang Xie
|
|
- Hector Gallagher
- 5 years ago
- Views:
Transcription
1 Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP Zhenyu Li Donghui Yang Zhenhua Li Chunjing Han Gaogang Xie
2 Continuous increase of mobile data CISCO projected: the mobile data will increase7-fold by 2021 The increase is largely due to rich content being available Video traffic will be 78% by 2021 The Internet is indeed a content network Content request Data / content PAM 2018, Berlin 2
3 Content hosting and delivery service outsourcing content delivery Cloud Questions: network footprint? traffic locality? 3
4 Why China? The largest Internet in a single country Over 800 million video users unique local regulations and network policies Network is planned: very few ASes seen outside The ICP regulation: Akamai could not deploy replica servers in mainland China Heavily censored visible web access. How about invisible web access (a.k.a trackers)? Google is not accessible, but how about doubleclick? 4
5 Passive DNS Data timestamp, domain name, response IP list LDNS Logs were collected from all recursive DNS resolvers of a major Chinese cellular ISP 2 days, ~55 billion logs Response IP list: ~50% one single IP The first one was taken as the one that the hostname was mapped to PAM 2018, Berlin 5
6 Passive DNS Data Data Preprocessing IP to ASN using Team Cymru Aggregation IPs to /24 prefix FQDN (Full Qualified Domain Names) to their second level domains (SLDs) to save analysis time Invisible web access: identification of tracking domains using Easylist + EasylistChina. Ethical issues No personal ID (client IP addresses are not available) Such datasets are maintained by ISPs for maintenance purpose PAM 2018, Berlin 6
7 Metrics CDP: content delivery potential Fraction of domains that an AS can serve CMI: content monopoly index the extent to which an AS hosts content that others do not have AS1 AS2 CDP=4/6 CMI=1/4*(1/2+1+1/2+1/2)=5/8 AS3 S i : # of domains that can be served by this AS m j : # of ASes that can serve this domain CDP=2/6 CMI=1/2*(1+1)=1 Ager, B., Muhlbauer, W., Smaragdakis, G., Uhlig, PAM 2018, S.: Web Berlin content cartography, ACM IMC (2011) 7
8 Content Hosting Analysis PAM 2018, Berlin 8
9 A look at the top ASes Observations Biased distribution: top 2 accounting for 2/3 ISPs dominate: not CDNs /cloud Good locality: ~70% queries resolved to IPs of the examined ISP Possible reasons ISPs provide IDC or even servers to CDNs for content replication Only ISPs and some giant enterprises have their own ASes in China PAM 2018, ISP Berlin is the one where we obtained data 9
10 CDP of Top ASes: popular domains The examined ISP 0.95 Apple Popular content is well replicated into the examined cellular ISPs Good for performance Apple AS: low CDP, but higher rank in terms of requests Host of its own services that are frequently requested (by smart devices) PAM 2018, Berlin 10
11 CDP of Top ASes: all domains Alibaba cloud ISP ISP Chinanet backbone Tencent Cloud CDP values for all ASes are relatively low (<0.06) Because of huge volume of non-popular domains The rise of cloud Cloud platforms provide easy-to-use hosting services for individuals 11
12 Content similarity between ASes Cosine Similarity One vector for each AS: an element is <domain name, # of queries> Chinanet: giant network Cloud very low similarity (hosting nonpopular sites) The examined ISP Low similarity: high content availability Exception: Akamai ASes (#12 and #13) ü caused by the domain aggregation? 12
13 CMI of Top ASes Top 10k domains low CMI values for all ASes All domains Very high for the two cloud platforms Moderately high for Chinanet s ASes PAM 2018, Berlin 13
14 On Content Providers Questions: who deployed the replicas into the cellular ISP? How about their network footprints? Identification of major providers WhoIs utility: not accurate Last CNAME: not available spectrum clustering on the bipartite graph Intuition: a provider uses a set of IP prefixes to serve same sites è clustering /24 IP prefix Domain Weighted by the # of queries seen IP prefixes 14
15 On Content Providers 15 out of 900+ clusters account for ~50% query volume Giant players in mobile Internet dominate, e.g. Baidu, Alibaba, and Tencent Mixed: may contain one or more CDNs 4 Tencent clusters provide 4 different services 15
16 (Invisible web) tracker hosting infrastructure PAM 2018, Berlin 16
17 A look at trackers Only 2 trackers are based in China a potential cyber-security vulnerability Trackers are well-replicated into several networks 17
18 Tracking server Bimodal distribution: either seldom used by tracking service, or exclusively for trackers Monitoring traffic goes to the servers that are exclusively for trackers could provide insights into trackers usage PAM 2018, Berlin 18
19 Tracking from the net perspective Trackers have also been replicated into the examined cellular network, but still 20% goes abroad Low CDP, low CMI trackers are replicated into several ASes, and each AS hosts very few 19
20 Summary One of the first studies on content hosting infrastructure in cellular network fromthe Chinese perspective Finding 1: great traffic localityin the examined ISP network Finding 2: raise of cloud platforms Finding 3: most of the popular trackers are non-china based Methodology: clustering over bipartite graph to infer providers On-going work Data: One ISP è all major ISPs, with CNAME being available Vision: an up-to-date picture of the content hosting infrastructure in China 20
21 Thanks PAM 2018, Berlin 21
Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP
Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP Zhenyu Li 1,2, Donghui Yang 1,2, Zhenhua Li 3, Chunjing Han 1,2, and Gaogang Xie 1,2 1 Institute of Comp. Tech, Chinese Academy
More informationWeb Content Cartography. Georgios Smaragdakis Joint work with Bernhard Ager, Wolfgang Mühlbauer, and Steve Uhlig
Web Content Cartography Georgios Smaragdakis Joint work with Bernhard Ager, Wolfgang Mühlbauer, and Steve Uhlig Cartography Cartography (from Greek Χάρτης, chartes or charax = sheet of papyrus (paper)
More informationThe forces behind the changing Internet: IXPs and content delivery and SDN
The forces behind the changing Internet: IXPs and content delivery and SDN Steve Uhlig Queen Mary, University of London steve@eecs.qmul.ac.uk http://www.eecs.qmul.ac.uk/~steve/ Credit to collaborators:
More informationA content delivery perspective on mobility in the Internet
A content delivery perspective on mobility in the Internet Prof. Steve Uhlig Queen Mary, University of London steve@eecs.qmul.ac.uk Credit to collaborators: Bernhard Ager, Anja Feldmann, Benjamin Frank,
More informationBack-Office Web Traffic on the Internet. IMC 2014 Vancouver, BC, CANADA November 5-7, 2014
Back-Office Web Traffic on the Internet Enric Pujol Philipp Richter Balakrishnan Chandrasekaran Georgios Smaragdakis Anja Feldmann Bruce Maggs Keung- Chi Ng TU- Berlin TU- Berlin Duke University MIT /
More informationNew levels of cooperation between eyeball ISPs and OTT/CDNs. RIPE 75 Dubai Oct 24, 2017 Falk von Bornstaedt, DTAG ICSS
New levels of cooperation between eyeball ISPs and OTT/CDNs. RIPE 75 Dubai Oct 24, 2017 Falk von Bornstaedt, DTAG ICSS 1 LACK OF TRANSPARENCY IMPAIRS internet performance Appl e Traffic Generators Clouds
More informationDetecting Malicious Activity with DNS Backscatter Kensuke Fukuda John Heidemann Proc. of ACM IMC '15, pp , 2015.
Detecting Malicious Activity with DNS Backscatter Kensuke Fukuda John Heidemann Proc. of ACM IMC '15, pp. 197-210, 2015. Presented by Xintong Wang and Han Zhang Challenges in Network Monitoring Need a
More informationHow Akamai delivers your packets - the insight. Christian Kaufmann SwiNOG #21 11th Nov 2010
How Akamai delivers your packets - the insight Christian Kaufmann SwiNOG #21 11th Nov 2010 What is a Content Distribution Network? The RFCs and Internet Drafts define a Content Distribution Network, CDN,
More informationOptimal Cache Allocation for Content-Centric Networking
Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,
More informationEnd-user mapping: Next-Generation Request Routing for Content Delivery
Introduction End-user mapping: Next-Generation Request Routing for Content Delivery Fangfei Chen, Ramesh K. Sitaraman, Marcelo Torres ACM SIGCOMM Computer Communication Review. Vol. 45. No. 4. ACM, 2015
More informationMeasuring the IPv6 Internet by active DNS and HTTP measurements (work in progress)
Measuring the IPv6 Internet by active DNS and HTTP measurements (work in progress) emile.aben@ripe.net Early 21st centry http://www.ripe.net 1 The 2 Internets The IPv4 Internet The IPv6 Internet How are
More informationComplex Interactions in Content Distribution Ecosystem and QoE
Complex Interactions in Content Distribution Ecosystem and QoE Zhi-Li Zhang Qwest Chair Professor & Distinguished McKnight University Professor Dept. of Computer Science & Eng., University of Minnesota
More informationJohn S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante
John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante Northwestern, EECS http://aqualab.cs.northwestern.edu ! DNS designed to map names to addresses Evolved into a large-scale distributed system!
More informationAn Overview of PQC Workshops/Projects and Standardization Concerns in China
An Overview of PQC Workshops/Projects and Standardization Concerns in China Hong Xiang, Tao Xiang Chongqing University Zheng-feng Zhang Institute of Software Chinese Academy of Sciences Zheng-fu Han University
More informationA Tale of Three CDNs
A Tale of Three CDNs An Active Measurement Study of Hulu and Its CDNs Vijay K Adhikari 1, Yang Guo 2, Fang Hao 2, Volker Hilt 2, and Zhi-Li Zhang 1 1 University of Minnesota - Twin Cities 2 Bell Labs,
More information1 Case Studies - AppEx CDN Acceleration. Case Studies. Introduction. Case Study # 1 CDN (Content Delivery Network)
Introduction AppEx was founded in 2007 and has focused on the CDN market for many years. We have had great success Internationally helping CDNs to improve user experiences and be competitive in the constantly
More informationCharacterization of Collaborative Resolution in Recursive DNS Resolvers Rami Al-Dalky Kyle Schomp 2018 AKAMAI FASTER FORWARD TM
Characterization of Collaborative Resolution in Recursive DNS Resolvers Rami Al-Dalky Kyle Schomp Background on collaborative resolution www.example.com Recursive Resolver DNS Client 2 PAM 2018 Background
More informationNetwork measurement using Akamai's infrastructure. Mike P. Wittie
Network measurement using Akamai's infrastructure Mike P. Wittie 1 Overview Akamai has lots of servers close to users and lots of users close to servers Let s put their hands together (Of course we re
More informationSFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015
SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015 Tatsuya Mori 1, Takeru Inoue 2, Akihiro Shimoda 3, Kazumichi Sato 3, Keisuke Ishibashi 3, and Shigeki Goto
More informationNetworked systems and their users
Networked systems and their users q The expansion of the Google serving infrastructure q A personalized livestreaming system q A platform for crowdsourcing web QoE measurements Mapping the expansion of
More informationIndirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer
Indirection Indirection: rather than reference an entity directly, reference it ( indirectly ) via another entity, which in turn can or will access the original entity A x B "Every problem in computer
More informationIt s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley
It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley 1 A Brief History! Fall, 2006: Started Conviva with Hui Zhang (CMU)! Initial goal: use p2p technologies to reduce distribution
More informationAdvancing the Art of Internet Edge Outage Detection
Advancing the Art of Internet Edge Outage Detection ACM Internet Measurement Conference 2018 Philipp Richter MIT / Akamai Ramakrishna Padmanabhan University of Maryland Neil Spring University of Maryland
More informationWIth the technological advances on Web, cloud computing,
Understanding E-Commerce Systems under Massive Flash Crowd: Measurement, Analysis, and Implications Junqiang Ge, Student Member, IEEE, Ye Tian, Member, IEEE, Lei Liu, Rongheng Lan, and Xinming Zhang, Member,
More informationCharacterization of Collaborative Resolution in Recursive DNS Resolvers
Characterization of Collaborative Resolution in Recursive DNS Resolvers Rami Al-Dalky 1 and Kyle Schomp 2(B) 1 Case Western Reserve University, Cleveland, USA rami.al-dalky@case.edu 2 Akamai Technologies,
More informationCharacterization of Collaborative Resolution in Recursive DNS Resolvers
Characterization of Collaborative Resolution in Recursive DNS Resolvers Rami Al-Dalky 1 and Kyle Schomp 2 1 Case Western Reserve University 2 Akamai Technologies Abstract. Recursive resolvers in the Domain
More informationInternet. In this section: Links: Video: Did You Know - The power of the internet. Concepts > Internet
Internet is the world s largest public computer network, a network of networks that provides a vast array of services to individuals, businesses, and organizations around the world. In this section: Internet
More informationPeering with Akamai. CaribNOG November 2015 Belize City, Belize
Peering with Akamai CaribNOG 10 04 November 2015 Belize City, Belize The Akamai Intelligent Platform Highly distributed, deeply deployed on-demand computing platform that serves any kind of web traffic
More informationCell Spotting: Studying the Role of Cellular Networks in the Internet. John Rula. Fabián E. Bustamante Moritz Steiner 2017 AKAMAI FASTER FORWARD TM
Cell Spotting: Studying the Role of Cellular Networks in the Internet * John Rula * Fabián E. Bustamante Moritz Steiner * 1 Understanding cellular growth is critical Growing dominance of mobile On subscriptions
More informationPredicting and Preventing Cyber Threats. Paolo Passeri, Consulting Systems Engineer
Predicting and Preventing Cyber Threats Paolo Passeri, Consulting Systems Engineer The way we work has changed Internet Critical infrastructure Amazon, Rackspace, Windows Azure, etc. Business apps Salesforce,
More informationUnderstanding and Characterizing Hidden Interception of the DNS Resolution Path
Who Is Answering My Queries? Understanding and Characterizing Hidden Interception of the DNS Resolution Path Baojun Liu, Chaoyi Lu, Haixin Duan, YingLiu, ZhouLi, ShuangHaoand MinYang ISP DNS Resolver DNS
More informationTracking Evil with Passive DNS
Tracking Evil with Passive DNS Bojan Ždrnja, CISSP, GCIA, GCIH Bojan.Zdrnja@infigo.hr INFIGO IS http://www.infigo.hr Who am I? Senior information security consultant with INFIGO IS (Croatia) Mainly doing
More informationFrom Internet Data Centers to Data Centers in the Cloud
From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs
More informationCharacterizing a Meta-CDN
Characterizing a Meta-CDN Oliver Hohlfeld, Jan Rüth, Konrad Wolsing, http://comsys.rwth-aachen.de/ Berlin / PAM 2018 Motivation - What is a Meta-CDN? Content Delivery Networks Key component in the Internet,
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationInferring BGP Blackholing in the Internet
Inferring BGP Blackholing in the Internet Vasileios Giotsas, Georgios Smaragdakis, Christoph Dietzel, Philipp Richter, Anja Feldmann, and Arthur Berger TU Berlin CAIDA MIT DE-CIX Akamai DDoS A&acks are
More informationApplication Layer Traffic Optimization (ALTO)
Application Layer Traffic Optimization (ALTO) Network Positioning System Stefano Previdi - sprevidi@cisco.com Distinguished Engineer Cisco Systems RIPE61 Rome, November 2010 1 Cisco NPS Introduction NPS
More informationPeering at Peerings: On the Role of IXP Route Servers
Peering at Peerings: On the Role of IXP Route Servers Contact: Philipp Richter (prichter@inet.tu-berlin.de) Paper: net.t-labs.tu-berlin.de/~prichter/imc238-richtera.pdf Philipp Richter TU Berlin Nikolaos
More informationOutline Applications. Central Server Hierarchical Peer-to-peer. 31-Jan-02 Ubiquitous Computing 1
Outline Applications Central Server Hierarchical Peer-to-peer 31-Jan-02 Ubiquitous Computing 1 Networked distributed system architectures Central Server based Web servers Hierarchical Services Domain Name
More informationCost-Aware Capacity Provisioning for Internet Video Streaming CDNs
Advance Access publication on 27 February 2015 c The British Computer Society 2015. All rights reserved. For Permissions, please email: journals.permissions@oup.com doi:10.1093/comjnl/bxv015 Cost-Aware
More informationCONTENT-AWARE DNS. IMPROVING CONTENT-AWARE DNS RESOLUTION WITH AKAMAI DNSi CACHESERVE EQUIVALENCE CLASS. AKAMAI DNSi CACHESERVE
AKAMAI DNSi CACHESERVE CONTENT-AWARE DNS IMPROVING CONTENT-AWARE DNS RESOLUTION WITH AKAMAI DNSi CACHESERVE EQUIVALENCE CLASS. CacheServe is the telecommunication industry s gold standard for caching DNS.
More informationDNS Measurements at the.cn TLD Servers
2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery DNS Measurements at the.cn TLD Servers YUCHI Xuebiao China Internet Network Information Center, Graduate University of WANG
More informationToward Accurate Inference of Web Activities from Passive DNS Data
Toward Accurate Inference of Web Activities from Passive DNS Data Jingxiu Su, Zhenyu Li, Stephane Grumbach, Kave Salamatian, Chunjing Han, Gaogang Xie University of Chinese Academy of Sciences, China Institute
More informationMAPPING PEERING INTERCONNECTIONS TO A FACILITY
MAPPING PEERING INTERCONNECTIONS TO A FACILITY Vasileios Giotsas 1 Georgios Smaragdakis 2 Bradley Huffaker 1 Matthew Luckie 3 kc claffy 1 vgiotsas@caida.org WIE 2015 1 UCSD/CAIDA 2 MIT/TU Berlin 3 University
More informationBeyond Blind Defense: Gaining Insights from Proactive App Sec
Beyond Blind Defense: Gaining Insights from Proactive App Sec Speaker Rami Essaid CEO Distil Networks Blind Defense Means Trusting Half Your Web Traffic 46% of Web Traffic is Bots Source: Distil Networks
More informationChapter 2 Content Delivery Networks and Its Interplay with ISPs
Chapter 2 Content Delivery Networks and Its Interplay with ISPs This chapter surveys measurement studies on Content Delivery Networks (CDNs) in real world. Several representative CDNs with different architecture
More informationIoT Security Policy and Regulation Initiatives in China. Fan Dongyang, Huawei
IoT Security Policy and Regulation Initiatives in China Fan Dongyang, Huawei China Economy Facilitating High-quality Growth The new norm Going digital GDP Growth Rate Supply-side reform E-commerce is on
More informationRevealing the load-balancing behavior of YouTube traffic of interdomain links
Revealing the load-balancing behavior of YouTube traffic of interdomain links Ricky K. P. Mok + Vaibhav Bajpai*, Amogh Dhamdhere +, kc claffy + + CAIDA/ University of California San Diego * Technical University
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationA First Look at QUIC in the Wild
A First Look at QUIC in the Wild Jan Rüth 1, Ingmar Poese 2, Christoph Dietzel 3, Oliver Hohlfeld 1 1 : RWTH Aachen University 2 : Benocs GmbH 3 : TU Berlin / DE-CIX http://comsys.rwth-aachen.de/ London
More informationState of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager
State of the Internet Security Q2 2017 Mihnea-Costin Grigore Security Technical Project Manager Topics 1. Introduction 2. DDoS Attack Trends 3. Web Application Attack Trends 4. Spotlights 5. Resources
More informationCOMP6218: Content Caches. Prof Leslie Carr
COMP6218: Content Caches Prof Leslie Carr 1 Slashdot.org The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller site, causing a massive increase in traffic 2
More informationList of measurements in rural area
List of measurements in rural area Network Distance / Delay / HOP! Tool " ICMP Ping and UDP Ping (traceroute)! Targets / Tests " VSAT Gateways / Earth Station # Testing distance to VSAT FTP server at the
More informationCloud DNS Phone: (877)
Cloud DNS Phone: (877) 937-4236 Email: info@cdnetworks.com CDNetworks Inc., 1500 Valley Vista Dr. Diamond Bar, CA 91765, USA Table of Content Introduction... 3 Cloud DNS Global Points of Presence...3 CDNetworks
More informationIllegitimate Source IP Addresses At Internet Exchange Points
Illegitimate Source IP Addresses At Internet Exchange Points @ DENOG8, Darmstadt Franziska Lichtblau, Florian Streibelt, Philipp Richter, Anja Feldmann 23.11.2016 Internet Network Architectures, TU Berlin
More informationTowards Practical Differential Privacy for SQL Queries. Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley
Towards Practical Differential Privacy for SQL Queries Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley Outline 1. Discovering real-world requirements 2. Elastic sensitivity & calculating sensitivity
More informationShaocheng Wang, Guojun Wu
Ubiquitous and Mobile Computing CS 528: Characterizing Smartphone Usage Patterns from Millions of Android Users Shaocheng Wang, Guojun Wu Computer Science Dept. Worcester Polytechnic Institute (WPI) Introduction
More informationRadware DefensePro DDoS Mitigation Release Notes Software Version Last Updated: December, 2017
Radware DefensePro DDoS Mitigation Release Notes Software Version 8.13.01 Last Updated: December, 2017 2017 Cisco Radware. All rights reserved. This document is Cisco Public. Page 1 of 9 TABLE OF CONTENTS
More informationJoint Server Selection and Routing for Geo-Replicated Services
Joint Server Selection and Routing for Geo-Replicated Services Srinivas Narayana Joe Wenjie Jiang, Jennifer Rexford and Mung Chiang Princeton University 1 Large-scale online services Search, shopping,
More informationAuthors: Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, Jie Gao
Title: Moving Beyond End-to-End Path Information to Optimize CDN Performance Authors: Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, Jie Gao
More informationImproving Content Delivery Using Provider-aided Distance Information
Improving Content Delivery Using Provider-aided Distance Information Ingmar Poese T-Labs/TU Berlin ingmar@net.t-labs.tu-berlin.de Benjamin Frank T-Labs/TU Berlin bfrank@net.t-labs.tu-berlin.de Georgios
More information2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015
2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING
More informationRouting optimisation without BGP
Routing optimisation without BGP working with Akamai to improve HTTP(S) traffic flows Thomas Mangin IXManchester 19th of April 2017 Thank you to Ronan Mullally from Akamai Technologies for his help The
More informationAnatomy of a Large European IXP
Anatomy of a Large European IXP Nikos Chatzis Nadi Sarrar TU Berlin/T-Labs Anja Feldmann TU Berlin/T-Labs Bernhard Ager ETH Zürich Steve Uhlig Queen Mary University of London Walter Willinger AT&T Labs
More informationAlberto Dainotti
HI-Cube / HI 3 Hub for Internet Incidents Investigation Alberto Dainotti alberto@caida.org Center for Applied Internet Data Analysis University of California, San Diego LARGE-SCALE INCIDENTS a threat to
More informationCache Management for TelcoCDNs. Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK)
Cache Management for TelcoCDNs Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK) d.tuncer@ee.ucl.ac.uk 06/01/2017 Agenda 1. Internet traffic: trends and evolution
More informationSubscriber Data Correlation
Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service
More informationUsing Trustwave SEG Cloud with Exchange Online
.trust Using Trustwave SEG Cloud with Exchange Online Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Exchange Online 2 2 Networking and DNS Setup 2 3 Provisioning Trustwave
More informationTesting & Assuring Mobile End User Experience Before Production Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Henrik Rexed Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At
More informationNo domain left behind
No domain left behind is Let s Encrypt democratizing encryption? M Aertsen 1, M Korzyński 2, G Moura 3 1 National Cyber Security Centre The Netherlands 2 Delft University of Technology The Netherlands
More informationTHE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES
THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise
More informationOn the Prevalence and Characteristics of MPLS Deployments in the Open Internet
On the Prevalence and Characteristics of MPLS Deployments in the Open Internet Joel Sommers Colgate University Brian Eriksson Boston University Paul Barford University of Wisconsin The elephant in the
More informationCloud DNS. High Performance under any traffic conditions from anywhere in the world. Reliable. Performance
Cloud DNS High Performance under any traffic conditions from anywhere in the world Secure DNS System Reduce vulnerability to spoofing and distributed denial of service (DDoS) attacks Reliable Performance
More informationOpenINTEL an infrastructure for long-term, large-scale and high-performance active DNS measurements. Design and Analysis of Communication Systems
OpenINTEL an infrastructure for long-term, large-scale and high-performance active DNS measurements DACS Design and Analysis of Communication Systems Why measure DNS? (Almost) every networked service relies
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet datacenters Introduction Internet datacenters:
More informationRichard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel
Richard Curran :Security Officer EMEA Mario Romao : Senior Manager Policy, Intel Digital Convergence Across All Industries Traditional Economy Digital Convergence Blending of Traditional and Digital Business
More informationAlibaba Cloud CDN. FAQs
Alibaba Cloud CDN FAQs FAQs Product Strengths Alibaba Cloud CDN Product Strengths Stable and Fast - Advanced distributed system architecture, node reserves:around 500 nodes in China and over 30 abroad
More informationIPv6 Development in China
2010/TEL41/DSG/WKSP2/011 Agenda Item: Panel Discussion 2 IPv6 Development in China Submitted by: China Workshop for IPv6: Transforming the Internet Chinese Taipei 8 May 2010 IPv6 development in China Zhicheng
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationDistributed Systems Principles and Paradigms. Chapter 12: Distributed Web-Based Systems
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 12: Distributed -Based Systems Version: December 10, 2012 Distributed -Based Systems
More informationEmpirical Analysis of the Effects and the Mitigation of IPv4 Address Exhaustion
Empirical Analysis of the Effects and the Mitigation of IPv4 Address Exhaustion wissenschaftliche Aussprache 2. August 2017 Philipp Richter Internet Penetration, 2017, ISOC. The Internet connects 3.5 billion
More informationCloud Load Balancer CDNetworks Inc. All rights reserved.
Cloud Load Balancer Phone: (877) 937-4236 Email: info@cdnetworks.com 2019 CDNetworks Inc. All rights reserved. Table of Content DNS-based Global Load Balancing... 3 Key Features and Benefits... 4 POP Map...
More informationSolarWinds Orion Platform Scalability
TECH TIPS SolarWinds Orion Platform Scalability SolarWinds provides enterprise-class infrastructure management software designed to help manage and monitor data centers and IT infrastructure. With products
More informationProtecting DNS from Routing Attacks -Two Alternative Anycast Implementations
Protecting DNS from Routing Attacks -Two Alternative Anycast Implementations Boran Qian StudentID 317715 Abstract The Domain Names System (DNS) is an important role of internet infrastructure and supporting
More informationUpdate on TLS SNI and IPv6 client adoption
Update on TLS SNI and IPv6 client adoption IETF 101 London - MAPRG March 20, 2018 Presenter: Erik Nygren, HTTPS Growth Motivation HTTPS is growing rapidly but no IP multi-tenancy without
More informationSaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More informationThe Collateral Damage of Internet Censorship by DNS Injection
The Collateral Damage of Internet Censorship by DNS Injection Anonymous presented by Philip Levis 1 Basic Summary Great Firewall of China injects DNS responses to restrict access
More informationCIO INSIGHTS Boosting Agility and Performance on the Evolving Internet
CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet Boosting Agility & Performance on the Evolving Internet To improve customers web and mobile experiences, organizations must address
More informationMeasuring Privacy Threats in China-Wide Mobile Networks
Measuring Privacy Threats in China-Wide Mobile Networks Mingming Zhang 1, Baojun Liu 1, Chaoyi Lu 1, Jia Zhang 1, Shuang Hao 2 and Haixin Duan 1 1 Tsinghua University, 2 University of Texas at Dallas 1
More informationChinese Server Market Development and Major Brand Analysis
Industry Intelligence Program Computing Chinese Server Market Development and Major Brand Analysis Abstract Taking advantage of the rise of cloud and mobile computing, the server industry has been booming
More informationA Multi-Perspective Analysis of Carrier-Grade NAT Deployment
A Multi-Perspective Analysis of Carrier-Grade NAT Deployment Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, and
More informationDefining the Impact of the Edge Using The SamKnows Internet Measurement Platform. PREPARED FOR EdgeConneX
Defining the Impact of the Edge Using The SamKnows Internet Measurement Platform PREPARED FOR EdgeConneX Contents 1 EXECUTIVE SUMMARY 3 1.1 About EdgeConneX 3 1.2 About SamKnows 4 2 INTRODUCTION 5 2.1
More informationTHE UTILITY OF DNS TRAFFIC MANAGEMENT
SECURITY SERVICES WHITE PAPER THE UTILITY OF DNS TRAFFIC MANAGEMENT TABLE OF CONTENTS 2 ABOUT DNS 3 DNS TRAFFIC MANAGEMENT 4 MONITORING AND FAILOVER 5 TRAFFIC MANAGEMENT MONITORING PROBES 6 GLOBAL LOAD
More informationInternet exchange Federation Project Funding Proposal
Internet exchange Federation Project Funding Proposal The Internet exchange Point Database (IXPDB) Executive Summary Internet Exchange Points (IXPs) are network facilities that enable the interconnection
More informationCisco Unified Customer Voice Portal
This chapter explains the procedures you must perform to configure the Cisco Unified CVP Call and OAMP servers on Side A and Side B. Validate Network Card, page 2 Configure Unified CVP Call Server, page
More informationComodo cwatch Web Security Software Version 1.6
rat Comodo cwatch Web Security Software Version 1.6 Quick Start Guide Guide Version 1.6.010918 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo cwatch Web Security - Quick Start Guide
More informationMAPPING PEERING INTERCONNECTIONS TO A FACILITY
MAPPING PEERING INTERCONNECTIONS TO A FACILITY Vasileios Giotsas 1 Georgios Smaragdakis 2 Bradley Huffaker 1 Matthew Luckie 3 kc claffy 1 vgiotsas@caida.org CoNEXT 2015 1 UCSD/CAIDA 2 MIT/TU Berlin 3 University
More informationOverview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste
Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall
More informationPerformance and Scalability of Networks, Systems, and Services
Performance and Scalability of Networks, Systems, and Services Niklas Carlsson Linkoping University, Sweden Student presentation @LiU, Sweden, Oct. 10, 2012 Primary collaborators: Derek Eager (University
More information